Vulnerabilities > Unisys > Clearpath MCP

DATE CVE VULNERABILITY TITLE RISK
2018-02-26 CVE-2018-5762 Unspecified vulnerability in Unisys Clearpath MCP 58.1/59.1
The TLS implementation in the TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 58.1 before 58.160, 59.1 before 059.1a.17 (IC #17), and 60.0 before 60.044 might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
network
unisys
4.3
2017-03-10 CVE-2017-5872 Improper Input Validation vulnerability in Unisys Clearpath MCP 57.1/58.1/59.1
The TCP/IP networking module in Unisys ClearPath MCP systems with TCP-IP-SW 57.1 before 57.152, 58.1 before 58.142, or 59.1 before 59.172, when running a TLS 1.2 service, allows remote attackers to cause a denial of service (network connectivity disruption) via a client hello with a signature_algorithms extension above those defined in RFC 5246, which triggers a full memory dump.
network
low complexity
unisys CWE-20
5.0
2002-12-31 CVE-2002-2179 Denial Of Service vulnerability in Unisys Clearpath MCP Portscan
The dynamic initialization feature of the ClearPath MCP environment allows remote attackers to cause a denial of service (crash) via a TCP port scan using a tool such as nmap.
network
low complexity
unisys
7.8